Unit 8/10 - Cybersecurity and Global Impacts/ Algorithms Flashcards

(30 cards)

1
Q

Computing Innovation

A

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Personally Identifiable Information (PII)

A

information about an individual that identifies, links, relates, or describes them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Keylogging

A

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware

A

software intended to damage a computing system or to take partial control over its operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rogue Access Point

A

a wireless access point that gives unauthorized access to secure networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

a process of encoding messages to keep them secret, so only “authorized” parties can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Decryption

A

a process that reverses encryption, taking a secret message and reproducing the original plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric Key Encryption

A

involves one key for both encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public Eye Encryption

A

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multi-Factor Authentication

A

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computer Virus Scanning Software

A

protects a computing system against infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Problem

A

a general description of a task that can (or cannot) be solved with an algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Algorithm

A

a finite set of instructions that accomplish a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sequencing

A

putting steps in an order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Selection

A

deciding which steps to do next

17
Q

Iteration

A

doing some steps over and over

18
Q

Efficiency

A

a measure of how many steps are needed to complete an algorithmL

19
Q

Linear Search

A

a search algorithm which checks each element of a list, in order, until the desired value is found or all elements in the list have been checked.

20
Q

Binary Search

A

a search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.

21
Q

Reasonable Time

A

Algorithms with a polynomial efficiency or lower (constant, linear, square, cube, etc.) are said to run in a reasonable amount of time.

22
Q

Unreasonable Time

A

Algorithms with exponential or factorial efficiencies are examples of algorithms that run in an unreasonable amount of time.H

23
Q

Heuristic

A

provides a “good enough” solution to a problem when an actual solution is impractical or impossible

24
Q

Decision Problem

A

a problem with a yes/no answer (e.g., is there a path from A to B?)

25
Optimization Problem
a problem with the goal of finding the "best" solution among many (e.g., what is the shortest path from A to B?)
26
Undecidable Problem
a problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer
27
Sequential Computing
a model in which programs run in order, one command at a time.
28
Parallel Computing
a model in which programs are broken into small pieces, some of which are run simultaneously
29
Distributed Computing
a model in which programs are run by multiple devices
30
Speedup
the time used to complete a task sequentially divided by the time to complete a task in parallel